Time | Speaker | Title | Resources | |
---|---|---|---|---|
09:30 to 10:30 | Swastik Kopparty (University of Toronto, Toronto, Canada) | Lectures on Coding Theory (Lecture 1) | ||
11:00 to 12:00 | Mrinal Kumar (Tata Institute of Fundamental Research, Mumbai, India) | Lectures on Coding Theory (Lecture 2) | ||
14:00 to 15:00 | Madhur Tulsiani (Toyota Technological Institute, Chicago, USA) | Lectures of High-dimensional expanders (Lecture 1) | ||
15:30 to 16:30 | Madhur Tulsiani (Toyota Technological Institute, Chicago, USA) | Lectures of High-dimensional expanders (Lecture 2) |
Time | Speaker | Title | Resources | |
---|---|---|---|---|
09:30 to 10:30 | Swastik Kopparty (University of Toronto, Toronto, Canada) | Lectures on Coding Theory (Lecture 3) | ||
11:00 to 12:00 | Mrinal Kumar (Tata Institute of Fundamental Research, Mumbai, India) | Lectures on Coding Theory (Lecture 4) | ||
14:00 to 15:00 | Max Hopkins (University of California, San Diego, USA) | Lectures of High-dimensional expanders (Lecture 3) | ||
15:30 to 16:30 | Max Hopkins (University of California, San Diego, USA) | Lectures of High-dimensional expanders (Lecture 4) |
Time | Speaker | Title | Resources | |
---|---|---|---|---|
09:30 to 10:30 | Swastik Kopparty (University of Toronto, Toronto, Canada) | Lectures on Coding Theory (Lecture 5) | ||
11:00 to 12:00 | Mrinal Kumar (Tata Institute of Fundamental Research, Mumbai, India) | Lectures on Coding Theory (Lecture 6) | ||
14:00 to 15:00 | Max Hopkins (University of California, San Diego, USA) | Lectures of High-dimensional expanders (Lecture 5) | ||
15:30 to 16:30 | Max Hopkins (University of California, San Diego, USA) | Lectures of High-dimensional expanders (Lecture 6) |
Time | Speaker | Title | Resources | |
---|---|---|---|---|
09:30 to 10:30 | Swastik Kopparty (University of Toronto, Toronto, Canada) | Lectures on Coding Theory (Lecture 7) | ||
11:00 to 12:00 | Mrinal Kumar (Tata Institute of Fundamental Research, Mumbai, India) | Lectures on Coding Theory (Lecture 8) | ||
14:00 to 15:00 | Pavel Panteleev (Moscow State University) | Lectures on Chain Complexes and Codes (Lecture 1) | ||
15:30 to 16:30 | Pavel Panteleev (Moscow State University, Moscow, Russia) | Lectures on Chain Complexes and Codes (Lecture 2) |
Time | Speaker | Title | Resources | |
---|---|---|---|---|
09:30 to 10:30 | Madhur Tulsiani (Toyota Technological Institute, Chicago, USA) | Lectures of High-dimensional expanders (Lecture 7) | ||
11:00 to 12:00 | Madhur Tulsiani (Toyota Technological Institute, Chicago, USA) | Lectures of High-dimensional expanders (Lecture 8) | ||
14:00 to 15:00 | Pavel Panteleev (Moscow State University, Moscow, Russia) | Lectures on Chain Complexes and Codes (Lecture 3) | ||
15:30 to 16:30 | Pavel Panteleev (Moscow State University, Moscow, Russia) | Lectures on Chain Complexes and Codes (Lecture 4) |
Time | Speaker | Title | Resources | |
---|---|---|---|---|
09:30 to 10:00 | Madhur Tulsiani (Toyota Technological Institute, Chicago, USA) |
Expander graphs and optimally list-decodable codes We construct a new family of explicit codes that are list decodable to capacity and achieve an optimal list size of O(1/ϵ). In contrast to existing explicit constructions of codes achieving list decoding capacity, our arguments do not rely on algebraic structure but utilize simple combinatorial properties of expander graphs. Our construction is based on a celebrated distance amplification procedure due to Alon, Edmonds, and Luby [FOCS'95], which transforms any high-rate code into one with near-optimal rate-distance tradeoff. We generalize it to show that the same procedure can be used to transform any high-rate code into one that achieves list decoding capacity. Our proof can be interpreted as a "local-to-global" phenomenon for (a slight strengthening of) the generalized Singleton bound. As a corollary of our result, we also obtain the first explicit construction of LDPC codes achieving list decoding capacity, and in fact arbitrarily close to the generalized Singleton bound. Based on joint work with Fernando Granha Jeronimo, Tushant Mittal, and Shashank Srivastava. |
||
10:00 to 10:40 | Shashank Srivastava |
List Decoding Expander-Based Codes up to Capacity in Near-Linear Time We will talk about a new framework based on graph regularity lemmas, for list decoding and list recovery of codes based on spectral expanders. These constructions often proceed by showing that the distance of local constant-sized codes can be lifted to a distance lower bound for the global code. The regularity framework allows us to similarly lift list size bounds for local base codes, to list size bounds for the global codes. This allows us to obtain novel combinatorial bounds for list decoding and list recovery up to optimal radius, for Tanner codes of Sipser and Spielman, and for the distance amplification scheme of Alon, Edmonds, and Luby. Further, using existing algorithms for computing weak-regularity decompositions of sparse graphs in (randomized) near-linear time, these tasks can be performed in near-linear time. Based on joint work with Madhur Tulsiani. |
||
11:10 to 11:55 | Pravesh Kothari |
Hypergraph Rainbow Problems, Kikuchi Matrices, and Local Codes The classical rainbow cycle conjecture of Keevash, Mubayi, Verstrate, and Sudakov says that every properly edge-colored graph of average degree \Omega(log n) contains a "rainbow" cycle, i.e., a cycle with edges of all distinct colors. Recent advances have almost resolved this conjecture up to an additional log log n factor. In this talk, I will describe hypergraph variants of the graph rainbow problem and show how they are intimately related to the existence of (linear) locally decodable and locally correctable codes. For those familiar with the work in this area, this will be a combinatorial viewpoint on the spectral methods that yield similar results when the code is restricted to be linear. Based on joint works with Omar Alrabiah, Arpon Basu, David Munha-Correia, Venkat Guruswami, Tim Hsieh, Peter Manohar, Sidhanth Mohanty, Andrew Lin, and Benny Sudakov |
||
12:00 to 12:30 | Lalitha Vadlamani (International Institute of Information Technology, Hyderabad) |
An Analysis of RPA Decoding of Reed-Muller Codes Over the BSC In this talk, we consider the Recursive Projection-Aggregation (RPA) decoder, of Ye and Abbe (2020), for Reed-Muller (RM) codes. Our main contribution is an explicit upper bound on the probability of incorrect decoding, using the RPA decoder, over a binary symmetric channel (BSC). Importantly, we focus on the events where a single iteration of the RPA decoder, in each recursive call, is sufficient for convergence. Key components of our analysis are explicit estimates of the probability of incorrect decoding of first-order RM codes using a maximum likelihood (ML) decoder, and estimates of the error probabilities during the aggregation phase of the RPA decoder. Our results allow us to show that for RM codes with blocklength $N = 2^m$, the RPA decoder can achieve vanishing error probabilities, in the large blocklength limit, for RM orders that grow roughly logarithmically in $m$. |
||
14:15 to 15:00 | Max Hopkins (University of California, San Diego, USA) |
Concentration on HDX: Derandomization Beyond Chernoff Chernoff's bound states that for any $A \subset [N]$ the probability a random $k$-tuple $s \in {[N] \choose k}$ correctly `samples' $A$ (i.e. that the density of $A$ in $s$ is close to its mean) decays exponentially in the dimension $k$. In 1987, Ajtai, Komlos, and Szemeredi proved the "Expander-Chernoff Theorem", a powerful derandomization of Chernoff's bound stating that one can replace ${[N] \choose k}$ with the significantly sparser family $X_G(k) \subsetneq {[N] \choose k}$ of length-$k$ paths on an expander graph $G$ while maintaining essentially the same concentration. Their result, which allows amplification without significant blow-up in size or randomness, has since become a mainstay in theoretical computer science with breakthrough applications in derandomization, coding, pseudorandomness, cryptography, and complexity. One natural way to view AKS is to say Expander-Walks are pseudorandom with respect to functions of their vertices, or against "degree 1" functions. In modern complexity, especially in the context of hardness amplification and PCPs, we often need concentration against higher degree functions, e.g. functions of edges or triples. Unfortunately, due to their inherent low-dimensionality, walks on expanders are not pseudorandom even at degree 2, and the construction of such a de-randomized object has remained largely open. In 2017 Dinur and Kaufman offered a partial resolution to this question in high dimensional expanders, a derandomized family satisfying Chebyshev-type (inverse polynomial) concentration for higher degree functions. Their work led to breakthrough applications in agreement testing and PCPs (Bafna, Minzer, Vyas, and Yun STOC 2025), but left an exponential gap with known bounds for the complete hypergraph ${[N] \choose k}$ needed for further applications. In this talk, we close this gap and prove (strong enough) HDX indeed have Chernoff-type tails. Time willing, we will discuss the relation of these bounds to a powerful analytic inequality called reverse hypercontractivity and its applications to agreement tests with optimal soundness. Based on joint work with Yotam Dikstein. |
||
15:30 to 16:00 | Gilles Zémor (Université de Bordeaux, Bordeaux, France) |
Kneser's theorem for codes and $\ell$-divisible set families A k-wise m-divisible set family is a collection F of subsets of {1,...,n} such that any intersection of k sets in F has cardinality divisible by m. If k=m=2, it is well-known that |F| <= 2^{[n/2]}. We generalise this by proving that |F| <= 2^{[n/p]} if k=m=p, for any prime number p. |
||
16:00 to 16:30 | Swastik Kopparty (University of Toronto, Toronto, Canada) |
GAP codes GAP codes are error-correcting codes based on evaluating degree-d m-variate polynomials at some GAP codes turn out to have a a very simple description from the point of view of HDXs: they are Tanner codes on the complete $m$-dimensional complex with Reed-Solomon codes as the inner code. I will talk about their construction, how to decode them, and the somewhat surprising fact that despite having much fewer evaluation points than Reed-Muller codes, GAP codes are also locally testable with O(n^{1/m}) queries. Joint work with Harry Sha and Mrinal Kumar |
||
17:00 to 17:30 | Mitali Bafna (Massachusetts Institute of Technology, Cambridge, USA) |
Efficient PCPs from HDX The theory of probabilistically checkable proofs (PCPs) shows how to encode a proof for any theorem into a format where the theorem's correctness can be verified by making only a constant number of queries to the proof. The PCP Theorem [ALMSS] is a fundamental result in computer science with far-reaching consequences in hardness of approximation, cryptography, and cloud computing. A PCP has two important parameters: 1) the size of the encoding, and 2) soundness, which is the probability that the verifier accepts an incorrect proof, both of which we wish to minimize. In 2005, Dinur gave a surprisingly elementary and purely combinatorial proof of the PCP theorem that relies only on tools such as graph expansion, while also giving the first construction of 2-query PCPs with quasi-linear size and constant soundness (close to 1). Our work improves upon Dinur's PCP and constructs 2-query, quasi-linear size PCPs with arbitrarily small constant soundness. As a direct consequence, assuming the exponential time hypothesis, we get that no approximation algorithm for 3-SAT can achieve an approximation ratio significantly better than 7/8 in time 2^{n/polylog n}. In this talk, I will introduce PCPs and discuss the components that go into our proof. This talk is based on joint work with Dor Minzer and Nikhil Vyas, with an appendix by Zhiwei Yun. |
Time | Speaker | Title | Resources | |
---|---|---|---|---|
09:30 to 10:00 | David Lin (UC San Diego, San Diego, USA) | Sheaf codes, cup products, and quantum LDPC codes with transversal non-Clifford gates. | ||
10:10 to 10:40 | Pavel Panteleev (Moscow State University, Moscow, Russia) |
Coboundary Expansion of Tensor Product Codes over Large Fields The coboundary expansion property of tensor product codes, also known as product expansion, plays an important role in the discovery of good quantum LDPC codes and classical locally testable codes. Prior research has shown that this property is equivalent to agreement testability and robust testability for products of two codes with linear distance. However, for products of more than two codes, it is a strictly stronger property. In this talk, I will outline key ideas underlying a recent result establishing that tensor products of an arbitrary number of random codes over sufficiently large fields exhibit strong coboundary expansion. This result suggests promising directions for new quantum locally testable code constructions. |
||
11:10 to 11:55 | Venkat Guruswami |
Good Quantum Codes via Tensor Products A central challenge in quantum computing is to efficiently perform computations in a fault-tolerant manner. Schemes for fault-tolerance rely on quantum error-correcting codes that possess two key features: (1) low-weight stabilizers (i.e., lightweight parity checks) and (2) transversal non-Clifford gates, which provide the algebraic structure needed for universal computation. However, achieving these properties has proven difficult. In fact, the first asymptotically good codes satisfying either (1) or (2) individually were constructed only recently. Asymptotically good codes achieving both properties simultaneously—potentially enabling new, more efficient, and resilient fault-tolerance protocols—have remained elusive. In this talk, we present new code constructions that make progress on this challenge. Specifically, we construct the first known asymptotically good quantum codes with sublinear-weight checks that also support transversal non-Clifford gates. In addition, our work gives the first (nearly) asymptotically good codes with subpolynomial-weight checks that do not rely on the lifted/balanced product operation of previous constructions. Instead, our approach is based on the simpler and more elementary tensor product. Based on joint work with Louis Golowich. |
||
12:00 to 12:30 | Roy Meshulam (Technion – Israel Institute of Technology, Haifa , Israel) |
Homology and Expansion of Random Complexes In recent years there is a growing interest in higher dimensional random complexes, both as natural extensions of random graphs, and as potential tools for new applications, e.g. to higher dimensional expanders. We will focus on two models of random complexes and their generic topological properties: 1. A classical theorem of Alon and Roichman asserts that the Cayley graph C(G,S) of a group G with respect to a logarithmic size random subset S of G is a good expander. We consider a k-dimensional analogue of Cayley graphs, called Balanced Cayley Complexes, discuss the spectral gap of their (k-1)-Laplacian and in particular obtain a high dimensional version of the Alon-Roichman theorem. 2. A permutation complex is the order complex of the intersection of two linear orders. We describe some properties of these complexes and discuss bounds on the probability that a permutation complex associated with random orders is topologically k-connected. |
||
14:00 to 15:00 | Ashutosh Shankar, Arka Ray, Rohit Yadav, Amalok Kalra | Lightning Talks | ||
15:30 to 16:00 | Shubhangi Saraf (University of Toronto, Toronto, Canada) |
Proximity Gaps for Reed-Solomon Codes I will talk about proximity gaps for Reed-Solomon codes. In particular we will discuss questions of the following kind: How many points of an affine space can be "close" in Hamming distance to the Reed-Solomon code? We will see how to use an understanding of this, to effectively analyze interactive protocols for testing if a given function is close to a Reed-Solomon Codeword. |
||
16:00 to 16:30 | Nicolas Resch (University of Amsterdam, Amsterdam, Netherlands) |
Efficient Cryptographic Proofs from RAA Codes In this talk, we will introduce interactive oracle proofs (IOPs), which are an interactive generalization of probabilistically-checkable proofs (PCPs). IOPs can then be “compiled” into very efficient cryptographic proofs, which can be very short (say, polylogarithmic length) and admit very efficient verifiers (say, polylogarithmic time). One requirement that arises from practice is that the prover also be very efficient; ideally, running in linear time. After introducing these concepts, I will outline how one can use error-correcting codes with efficient encoding algorithms to design efficient cryptographic proofs. We will then discuss Repeat-Accumulate-Accumulate (RAA) codes, which are a simple class of turbo codes offering extremely efficient encoding and near-GV bound minimum distance. We will spend a good portion of this presentation describing these codes, discussing the challenges which arise in their analysis, and surveying some open problems. |
||
17:00 to 17:30 | Sourav Chakraborty (Indian Statistical Institute, Kolkata, India) | Testing of Codes in the Huge Object Model. |